ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Threat Summary: Top 2016 Cyber Risks

    Sponsored by: Proofpoint, Inc.

    Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.

  • Preventing internal Cybersecurity Breaches

    Sponsored by: Navex Global

    Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.

  • A Path to Good Risk Taking Through Data Analytics

    Sponsored by: SAS

    This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.

  • User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases

    Sponsored by: LogRhythm, Inc.

    Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.

  • Case Study: Alliant Credit Union Evolves Real-Time Fraud Detection

    Sponsored by: LogRhythm, Inc.

    Read this case study to determine how Alliant Credit Union automated analysis of fraud-related patterns and trends in real time, by consolidating all machine data from IT events and financial transactions on one SIEM platform.

  • Protect Medical Data and Prevent Ransomware Attacks in Healthcare

    Sponsored by: VASCO, INC.

    Access this e-guide to discover how to fend off cybercriminals using a three-layered approach to healthcare data protection, and read insights from one hospital CIO on both preventing a ransomware attack and recovering from one.

  • Firmwide Scenario Analysis and Stress Testing: Risk Perspective

    Sponsored by: SAS

    Stress testing is a vital aspect of any business' success. Special techniques have emerged in recent years after the recent financial crisis. Access this white paper to learn about the future of firmwide stress testing, the importance of risk management, and more.

  • Best Practices for Securing Microsoft Azure Hybrid Clouds

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Cloud IAM Buyer's Guide: Which Vendor is Right for You?

    Sponsored by: IBM

    Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.

  • Securing the Private Cloud

    Sponsored by: Fortinet, Inc.

    The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.

  • Mitigating Security Risk from Partners, Affiliates and Suppliers

    Sponsored by: Dell SecureWorks

    Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.

  • Effectively Manage Application Security Risk in the Cloud

    Sponsored by: IBM

    Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.

  • Next Level Threats: Stopping Ransom & CEO Email fraud

    Sponsored by: Trustwave

    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.

  • Top 5 Reasons Why You Need an AppSec Program

    Sponsored by: Veracode, Inc.

    A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.

  • Cb Defense: PCI DSS Anti-Virus Assessment

    Sponsored by: Carbon Black

    This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.

  • Top 6 Security Considerations in Migrating to Microsoft Windows 10

    Sponsored by: Absolute

    Examine 6 of the most important IT security considerations in migrating to Windows 10. Discover how persistent endpoint security tools can help you address these challenges and enable your devices to stay secure beyond the operating system upgrades.

  • Infographic: Mitigating the Impact of Critical IT Events

    Sponsored by: Splunk Services UK Ltd

    Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.

  • 3 Steps to Get Started with Web Application Security

    Sponsored by: Veracode, Inc.

    Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.

  • Cracking the Code on Application Security Success

    Sponsored by: Veracode, Inc.

    Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.

  • Application Security Program Checklist

    Sponsored by: Veracode, Inc.

    This step-by-step guide will help you implement an advanced application security program for your organization. Be ahead of the curve by knowing the answer to these questions before meeting with high ranking decision makers.

  • Infographic: Application-Layer Breaches Persist

    Sponsored by: Veracode, Inc.

    See four major examples of application-layer data breaches and the damage they caused. Discover how and why they happened so you can better secure your application software for the future.

  • Ultimate Guide to Application Security

    Sponsored by: Veracode, Inc.

    Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.

  • QRadar Security Intelligence Client Study

    Sponsored by: IBM

    This QRadar Security Intelligence Study, presented by Ponemon Institute, surveyed 196 US IT and IT security practitioners that use QRadar Security Intelligence to monitor and defend their company's network. Learn about QRadar's operational costs, how it is deployed at a variety of different companies and its advantages by accessing now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.